PrepAway - Latest Free Exam Questions & Answers

Category: 70-549

Exam 70-549: PRO: Designing and Developing Enterprise Applications by Using the Microsoft .NET Framework

Which two layers should you identify?

You are an enterprise application developer. You are creating an application that has a layered architecture as shown in the following diagram.

A component that resides in the workflow layer manages transactions across one or more activities in the business logic layer. You need to make modifications to the component. You need to identify the layers that might require modification when the component in the workflow layer is modified.

Which two layers should you identify? (Each correct answer presents part of the solution. Choose two.)

Which approach should you choose?

You are an enterprise application developer. You are creating the first version of an application to manage rich text documents.
The application must meet the following design requirements:

Support the file system and a Microsoft SQL Server database as data stores.
Ensure the following for future versions:
o Add support for additional data stores, including network storage. o Acquire the ability to interface with third-party-distributed authoring and versioning tools.

Bring additional storage options online without having to redeploy the entire application. You need to identify an appropriate approach to meet these requirements. Which approach should you choose?

What should you do?

You are an enterprise application developer. You are implementing a new component for an application. The component accesses a database to populate a list of customer objects and exposes a method that is named GetAllCustomers. The component uses a design pattern to access the database only on an as-needed basis. A caching mechanism exists in a lower tier of the application architecture. The component must not cache data. You need to implement the logic for populating a list of customer objects by using a database query. You also need to ensure that you meet the company guidelines for the component design pattern. What should you do?

What should you do?

You are an enterprise application developer. You design a data access component that interacts with a Microsoft SQL Server database. The component uses a database connection string. The database connection string is stored in clear text in the ConnectionStrings section of the application configuration file. During testing, you discover that the component might be vulnerable
to SQL injection attacks. You need to adopt a strategy to protect the component from SQL injection attacks. What should you do?


Page 21 of 21« First...10...1718192021